• BS ISO/IEC 20008-1:2013

    Current The latest, up-to-date edition.

    Information technology. Security techniques. Anonymous digital signatures General

    Available format(s):  Hardcopy, PDF

    Language(s):  English

    Published date:  31-12-2013

    Publisher:  British Standards Institution

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Foreword
    Introduction
    1 Scope
    2 Terms and definitions
    3 Abbreviations and legend for figures
    4 Options for a group public key and multiple
      public keys
    5 General requirements
    6 Mechanisms using a group public key
    7 Mechanisms using multiple public keys
    Bibliography

    Abstract - (Show below) - (Hide below)

    Describes principles, including a general model, a set of entities, a number of processes, and general requirements for the following two categories of anonymous digital signature mechanisms: a) signature mechanisms using a group public key, and b) signature mechanisms using multiple public keys.

    Scope - (Show below) - (Hide below)

    This part of ISO/IEC20008 specifies principles, including a general model, a set of entities, a number of processes, and general requirements for the following two categories of anonymous digital signature mechanisms: signature mechanisms using a group public key, and signature mechanisms using multiple public keys.

    General Product Information - (Show below) - (Hide below)

    Committee IST/33/2
    Development Note Supersedes 12/30236961 DC. (01/2014)
    Document Type Standard
    Publisher British Standards Institution
    Status Current
    Supersedes

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 20008-2:2013 Information technology — Security techniques — Anonymous digital signatures — Part 2: Mechanisms using a group public key
    ISO/IEC 11770-2:2008 Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques
    ISO/IEC 15945:2002 Information technology — Security techniques — Specification of TTP services to support the application of digital signatures
    ISO/IEC 18033-2:2006 Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers
    ISO/IEC 9594-8:2017 Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks
    ISO/IEC 13888-1:2009 Information technology Security techniques Non-repudiation Part 1: General
    ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective